Presentation is loading. Please wait.

Presentation is loading. Please wait.

IEEE MEDIA INDEPENDENT HANDOVER DCN: srho

Similar presentations


Presentation on theme: "IEEE MEDIA INDEPENDENT HANDOVER DCN: srho"— Presentation transcript:

1 IEEE 802.21 MEDIA INDEPENDENT HANDOVER DCN: 21-11-0099-00-srho
Title: IEEE c SRHO Protocol Consideration to transport IEEE Network Entry Messages Date Submitted: Presented at IEEE session #45 in San Francisco, USA Authors or Source(s): Hyunho Park, Junghoon Jee, Changmin Park Abstract: This draft summarizes the IEEE network entry messages to design IEEE c SRHO Protocol. srho

2 IEEE 802.21 presentation release statements
This document has been prepared to assist the IEEE Working Group. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE The contributor is familiar with IEEE patent policy, as stated in Section 6 of the IEEE-SA Standards Board bylaws < and in Understanding Patent Issues During IEEE Standards Development srho

3 Contents WiFi Network Entry and Handover Consideration & Issues

4 WiFi Network Entry and Handover
IEEE i Network Entry IEEE r Network Entry IEEE r Handover

5 802.11i Network Entry IEEE i Network Entry

6 Step 1 & 2: Basic Network Entry
Supplicant Unauthenticated Unassociated 802.1X Blocked Authenticator (7) Association Response (4) Open System Authentication Request (5) Open System Authentication Response (3) Probe Response + RSN IE (6) Association Request + RSN IE (2) Probe Request (1) Beacon + RSN IE Step 1: Network and Security Capability Discovery Step 2: 802.11 Authentication and Association RSN (Robust Security Network) IE (Information Element): carries robust security information that indicates the authentication and cipher algorithms

7 Step 3: EAP/802.1X/RADIUS Authentication
Network Entry Step 3: EAP/802.1X/RADIUS Authentication Supplicant Unauthenticated Unassociated 802.1X Blocked Authenticator Authentication Server (RADIUS) Master Session Key (MSK) (8) EAPOL-Start (9) EAPOL-Request, Identity (10) EAPOL-Response, Identity (11) RADIUS Request (12) Manual Authentication (de factor EAP-TLS) (13) RADIUS Accept (14) EAPOL Success (15) MSK IEEE i provides a Robust Security Network (RSN) Utilizes  IEEE 802.1X (EAP over LAN (EAPOL)) Mutual authentication protocol (de facto EAP-TLS) between the supplicant and the authentication server Master Session Key (MSK) The supplicant and authenticator generated some common secret (MSK) The supplicant uses the MSK to derive Pairwise Master Key (PMK)

8 Step 4: 4-way Handshake PTK (Pairwise Transient Key) Nonce
Network Entry Step 4: 4-way Handshake PTK (Pairwise Transient Key) Nonce Key material having a random or pseudo-random value ANonce: generated by the authenticator SNonce: generated by the supplicant Message integrity code (MIC) Generated by a cryptographic function Used for verification of PTK Supplicant Authenticator Key (PMK) is Known Generate SNonce Key (PMK) is Known Generate ANonce Message 1:EAPOL-Key(ANonce, Unicast) Derive PTK Message 2: EAPOL-Key (SNonce, Unicast, MIC) Derive PTK using ANonce and SNonce If needed Generate GTK Message 3: EAPOL-Key (Install PTK, Unicast, MIC, Encrypted GTK) Message 4: EAPOL-Key (Unicast, MIC) Install PTK and GTK Install PTK IEEE 802.1X Controlled Port Unblocked

9 IEEE 802.11i Messages for Network Entry
Step 1. Network and Security Capability Discovery Beacon with RSN IE (DL) Probe Request (UL) Probe Response with RSN IE (DL) Step Authentication and Association Open System Authentication Request (UL) Open System Authentication Response (DL) Association Request with RSN IE (UL) Association Response (DL)

10 IEEE 802.11i Messages for Network Entry (Cont’d)
Step 3. EAP/802.1X/RADIUS Authentication EAPOL-Start (UL) EAPOL-Request (DL) EAPOL-Response (UL) Manual Authentication (MS ↔ Authentication Server) EAPOL Success (DL) Step 4. 4-way Handshake Message 1: EAPOL-Key with ANonce (DL) Message 2: EAPOL-Key with SNonce (UL) Message 3: EAPOL-key with MIC (DL) Message 4: EAPOL-Key with MIC (UL)

11 802.11r Network Entry Procedure
STA AP FT: fast BSS transition MDIE (Mobility domain information element) MDID (Mobility domain identifier): BSS identifier Contains FT Capability and policy information FTIE (Fast BSS transition information element) Includes information needed to perform the FT authentication sequence during a fast BSS transition Authentication Request (Open) Authentication Response (Open) (Re)association Request (MDIE, RSNIE) (Re)association Response (MDIE, FTIE[R1KH-ID, R0KH-ID]) 802.1X EAP Authentication (bypassed if PSK is used) EAPOL-Key (ANonce) EAPOL-Key (SNonce, MIC, RSNIE[PMKR1Name], MDIE, FTIE) EAPOL-Key (ANonce, MIC, RSNIE[PMKR1Name], MDIE, GTK[N], FTIE,) EAPOL-Key (MIC) 802.1X Controlled Port Unblocked, Successful (Secure) Session and Data Transmission QoS Resource Allocation

12 IEEE 802.11r Messages for Network Entry
Step 1. Network and Security Capability Discovery Beacon with AA RSN IE (DL) Probe Request (UL) Probe Response with AA RSN IE (DL) Step Authentication and Association Open System Authentication Request (UL) Open System Authentication Response (DL) Association Request with MDIE & RSN IE (UL) Association Response with MDIE & FTIE (DL)

13 IEEE 802.11r Messages for Network Entry (Cont’d)
Step 3. EAP/802.1X/RADIUS Authentication EAPOL-Start (UL) EAPOL-Request (DL) EAPOL-Response (UL) 802.1X EAP Authentication (MS ↔ Authentication Server) EAPOL Success (DL) Step 4. 4-way Handshake Message 1: EAPOL-Key with ANonce (DL) Message 2: EAPOL-Key with SNonce, MDIE, and FTIE (UL) Message 3: EAPOL-key with MIC, MDIE, and FTIE (DL) Message 4: EAPOL-Key with MIC (UL)

14 Key Hierarchy for IEEE802.11r
Network Entry Key Hierarchy for IEEE802.11r MSK MSK Root PMK PMK-R0 Application PMK-R11 PMK-R12 Traffic TK TK1 TK2 IEEE i IEEE r Root key: scoped for home AAA servers Application key: for network authentication or reauthentication Traffic key: encrypts and authenticates network traffic

15 802.11r Wi-Fi Network Handover (1)
Entry 802.11r Wi-Fi Network Handover (1) STA Current AP Target AP Over-the-air FT Protocol in an RSN FTAA (Fast BSS Transition Authentication Algorithm) RIC (Resource Information Container) pairwise master key (PMK) R0 name (PMKR0Name) R0 key holder (R0KH): old AP Holds the PMK-R0 R1KH: new AP Successful (secure) session & Data transmission Authentication Request (FTAA, RSNIE[PMKR0Name], MDIE, FTIE[SNonce, R0KH-ID]) Authentication Response (FTAA, RSNIE[PMKR0Name], MDIE, FTIE[ANonce, SNonce, R1KH-ID, R0KH-ID]) Time between Authentication Request and Reasociation Request must not exceed Reassociation Deadline Time Reassociation Request (RSNIE[PMKR1Name], MDIE, FTIE[MIC, ANonce, SNonce, R1KH-ID, R0KH-ID], RIC-Request) Reassociation Response (RSNIE[PMKR1Name], MDIE, FTIE[MIC, ANonce, SNonce, R1KH-ID, R0KH-ID], GTK[N]], RIC-Response) 802.1X Controlled Port Unblocked, Successful (Secure) Session and Data Transmission

16 802.11r Wi-Fi Network Handover (2)
Entry 802.11r Wi-Fi Network Handover (2) STA Current AP Target AP Successful (secure) session & Data transmission FT Request (FTAA, RSNIE[PMKR0Name], MDIE, FTIE[SNonce, R0KH-ID]) Over-the-DS FT Protocol in an RSN FT Response (FTAA, RSNIE[PMKR0Name], MDIE, FTIE[Anonce, Snonce, R1KH-ID, R0KH-ID]) Time between FT Request and Reaasociation Request must not exceed Reassociation Deadline Time Reassociation Request (RSNIE[PMKR1Name], MDIE, FTIE[MIC, ANonce, SNonce, R1KH-ID, R0KH-ID], RIC-Request) Reassociation Response (RSNIE[PMKR1Name], MDIE, FTIE[MIC, ANonce, SNonce, R1KH-ID, R0KH-ID], GTK[N]], RIC-Request) 802.1X Controlled Port Unblocked, Successful (Secure) Session and Data Transmission

17 IEEE 802.11r Messages for Network Handover
Entry IEEE r Messages for Network Handover Authentication Request with FTAA, RSNIE, MDIE, and FTIE (UL) Authentication Response with FTAA, RSNIE, MDIE, and FTIE (DL) Reassociation Request with RSNIE, MDIE, and RIC-Request (UL) Reassociation Response with RSNIE, MDIE, and RIC-Response (DL)

18 Consideration or Issue


Download ppt "IEEE MEDIA INDEPENDENT HANDOVER DCN: srho"

Similar presentations


Ads by Google